CompTIA Network+ N10-009 Exam Cram

E-book Engels 2024 9780135340912
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

CompTIA Network+ N10-009 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.

Covers the critical information needed to score higher on your Network+ N10-009 exam! Establish network connectivity by deploying wired and wireless devices Learn the purpose of documentation and maintain network documentation Configure common network services Learn basic datacenter, cloud, and virtual networking concepts Monitor network activity and troubleshoot performance and availability issues Implement network security hardening techniques Manage, configure, and troubleshoot network infrastructure

Prepare for your exam with Pearson Test Prep Realistic practice questions and answers Comprehensive reporting and feedback Customized testing in study, practice exam, or flash card modes Complete coverage of CompTIA Network+ N10-009 exam objectives

Specificaties

ISBN13:9780135340912
Taal:Engels
Bindwijze:e-book
Serie:Exam Cram

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction<br><strong>CHAPTER 1</strong> Networking Models, Ports, Protocols, and Services<br> The OSI Networking Model<br> &nbsp;&nbsp;&nbsp; The OSI Seven-Layer Model<br> &nbsp;&nbsp;&nbsp; Comparing OSI to the Four-Layer TCP/IP Model<br> &nbsp;&nbsp;&nbsp; Identifying the OSI Layers at Which Various Network Components Operate<br> &nbsp;&nbsp;&nbsp; Data Encapsulation/Decapsulation and OSI<br> Ports, Protocols, Services, and Traffic Types<br> &nbsp;&nbsp;&nbsp; Connection-Oriented Protocols Versus Connectionless Protocols<br> &nbsp;&nbsp;&nbsp; Internet Protocol<br> &nbsp;&nbsp;&nbsp; Transmission Control Protocol<br> &nbsp;&nbsp;&nbsp; User Datagram Protocol<br> &nbsp;&nbsp;&nbsp; Internet Control Message Protocol<br> &nbsp;&nbsp;&nbsp; IPsec<br> &nbsp;&nbsp;&nbsp; Generic Routing Encapsulation<br> &nbsp;&nbsp;&nbsp; File Transfer Protocol (FTP)<br> &nbsp;&nbsp;&nbsp; Secure File Transfer Protocol (SFTP)<br> &nbsp;&nbsp;&nbsp; Secure Shell (SSH)<br> &nbsp;&nbsp;&nbsp; Telnet<br> &nbsp;&nbsp;&nbsp; Simple Mail Transfer Protocol (SMTP)<br> &nbsp;&nbsp;&nbsp; Domain Name System (DNS)<br> &nbsp;&nbsp;&nbsp; Dynamic Host Configuration Protocol (DHCP)<br> &nbsp;&nbsp;&nbsp; Trivial File Transfer Protocol (TFTP)<br> &nbsp;&nbsp;&nbsp; Hypertext Transfer Protocol (HTTP)<br> &nbsp;&nbsp;&nbsp; Network Time Protocol (NTP)<br> &nbsp;&nbsp;&nbsp; Simple Network Management Protocol (SNMP)<br> &nbsp;&nbsp;&nbsp; Lightweight Directory Access Protocol (LDAP)<br> &nbsp;&nbsp;&nbsp; Hypertext Transfer Protocol Secure (HTTPS)<br> &nbsp;&nbsp;&nbsp; Server Message Block (SMB)<br> &nbsp;&nbsp;&nbsp; Syslog<br> &nbsp;&nbsp;&nbsp; Simple Mail Transfer Protocol Secure (SMTPS)<br> &nbsp;&nbsp;&nbsp; Lightweight Directory Access Protocol over SSL (LDAPS)<br> &nbsp;&nbsp;&nbsp; Structured Query Language (SQL) Server<br> &nbsp;&nbsp;&nbsp; Remote Desktop Protocol (RDP)<br> &nbsp;&nbsp;&nbsp; Session Initiation Protocol (SIP)<br> &nbsp;&nbsp;&nbsp; Understanding Port Functions<br> &nbsp;&nbsp;&nbsp; Traffic Types<br> What’s Next?<br><strong>CHAPTER 2</strong> Network Topologies, Architectures, and Types<br> Network Topologies<br> &nbsp;&nbsp;&nbsp; Star/Hub and Spoke<br> &nbsp;&nbsp;&nbsp; Mesh Topology<br> &nbsp;&nbsp;&nbsp; Hybrid Topology<br> &nbsp;&nbsp;&nbsp; Point to Point<br> &nbsp;&nbsp;&nbsp; Spine and Leaf<br> &nbsp;&nbsp;&nbsp; Three-Tier Hierarchical Model<br> &nbsp;&nbsp;&nbsp; Collapsed Core<br> &nbsp;&nbsp;&nbsp; Traffic Flows<br> &nbsp;&nbsp;&nbsp; Older Topologies: Bus and Ring<br> What’s Next?<br><strong>CHAPTER 3</strong> Network Addressing, Routing, and Switching<br> IPv4 Network Addressing<br> &nbsp;&nbsp;&nbsp; An Overview of IPv4<br> &nbsp;&nbsp;&nbsp; IP Address Classes<br> &nbsp;&nbsp;&nbsp; Subnet Mask Assignment<br> &nbsp;&nbsp;&nbsp; Subnetting<br> &nbsp;&nbsp;&nbsp; Identifying the Differences Between IPv4 Public and Private Networks<br> &nbsp;&nbsp;&nbsp; Classless Interdomain Routing<br> &nbsp;&nbsp;&nbsp; Default Gateways<br> &nbsp;&nbsp;&nbsp; Assigning IP Addresses<br> &nbsp;&nbsp;&nbsp; Identifying MAC Addresses<br> Routing and Switching Technologies<br> &nbsp;&nbsp;&nbsp; The Default Gateway<br> &nbsp;&nbsp;&nbsp; Routing Tables<br> &nbsp;&nbsp;&nbsp; Static Routing<br> &nbsp;&nbsp;&nbsp; Default Route<br> &nbsp;&nbsp;&nbsp; Switching Methods<br> &nbsp;&nbsp;&nbsp; Dynamic Routing<br> &nbsp;&nbsp;&nbsp; Route Selection<br> &nbsp;&nbsp;&nbsp; Address Translation<br> &nbsp;&nbsp;&nbsp; First Hop Redundancy Protocol (FHRP)<br> &nbsp;&nbsp;&nbsp; Virtual IP<br> &nbsp;&nbsp;&nbsp; Subinterfaces<br> &nbsp;&nbsp;&nbsp; Virtual Local-Area Networks<br> &nbsp;&nbsp;&nbsp; Interface Configuration and Switch Management<br> &nbsp;&nbsp;&nbsp; Voice VLAN<br> &nbsp;&nbsp;&nbsp; Trunking<br> &nbsp;&nbsp;&nbsp; The Spanning Tree Protocol (STP)<br> &nbsp;&nbsp;&nbsp; Maximum Transmission Unit (MTU)<br> Network Services<br> &nbsp;&nbsp;&nbsp; Dynamic Host Configuration Protocol<br> &nbsp;&nbsp;&nbsp; The DHCP Process<br> &nbsp;&nbsp;&nbsp; DHCP and DNS Suffixes<br> &nbsp;&nbsp;&nbsp; DHCP Relays and IP Helpers<br> &nbsp;&nbsp;&nbsp; Domain Name Service (DNS)<br> &nbsp;&nbsp;&nbsp; The DNS Namespace<br> &nbsp;&nbsp;&nbsp; Types of DNS Entries<br> &nbsp;&nbsp;&nbsp; DNS Records<br> &nbsp;&nbsp;&nbsp; DNS in a Practical Implementation<br> &nbsp;&nbsp;&nbsp; Time Protocols<br> What’s Next?<br><strong>CHAPTER 4</strong> Network Implementations<br> Common Networking Devices<br> &nbsp;&nbsp;&nbsp; Router<br> &nbsp;&nbsp;&nbsp; Switch<br> &nbsp;&nbsp;&nbsp; Firewall<br> &nbsp;&nbsp;&nbsp; IDS/IPS<br> &nbsp;&nbsp;&nbsp; Load Balancer<br> &nbsp;&nbsp;&nbsp; Proxy Server<br> &nbsp;&nbsp;&nbsp; Network-Attached Storage (NAS)<br> &nbsp;&nbsp;&nbsp; Storage-Area Networks<br> &nbsp;&nbsp;&nbsp; Wireless Access Point<br> &nbsp;&nbsp;&nbsp; Wireless LAN Controller<br> &nbsp;&nbsp;&nbsp; Applications/Content Delivery Network<br> &nbsp;&nbsp;&nbsp; VPNs<br> &nbsp;&nbsp;&nbsp; Quality of Service<br> &nbsp;&nbsp;&nbsp; Time To Live (TTL)<br> Networking Use Cases<br> &nbsp;&nbsp;&nbsp; Software-Defined Networking<br> &nbsp;&nbsp;&nbsp; Virtual Extensible Local-Area Network (VXLAN)<br> &nbsp;&nbsp;&nbsp; Zero Trust Architecture (ZTA)<br> &nbsp;&nbsp;&nbsp; Secure Access Secure Edge (SASE)/Security Service Edge (SSE)<br> &nbsp;&nbsp;&nbsp; Infrastructure as Code (IaC)<br> &nbsp;&nbsp;&nbsp; IPv6 Addressing<br> &nbsp;&nbsp;&nbsp; Comparing IPv4 and IPv6 Addressing<br> What’s Next?<br><strong>CHAPTER 5</strong> Cabling Solutions and Issues<br> General Media Considerations<br> &nbsp;&nbsp;&nbsp; Broadband Versus Baseband Transmissions<br> &nbsp;&nbsp;&nbsp; Simplex, Half-Duplex, and Full-Duplex Modes<br> &nbsp;&nbsp;&nbsp; Data Transmission Rates<br> &nbsp;&nbsp;&nbsp; Wired Versus Wireless<br> &nbsp;&nbsp;&nbsp; Types of Wired Network Media<br> &nbsp;&nbsp;&nbsp; Types of Media Connectors<br> &nbsp;&nbsp;&nbsp; Media Couplers/Converters<br> &nbsp;&nbsp;&nbsp; TIA/EIA 568A and 568B Wiring Standards<br> &nbsp;&nbsp;&nbsp; Straight-Through Versus Crossover Cables<br> &nbsp;&nbsp;&nbsp; Rollover and Loopback Cables<br> &nbsp;&nbsp;&nbsp; Ethernet Copper and Fiber Standards<br> &nbsp;&nbsp;&nbsp; Multiplexing Options<br> Troubleshooting Common Cable Connectivity Issues<br> Limitations, Considerations, and Issues<br> &nbsp;&nbsp;&nbsp; Throughput, Speed, and Distance<br> &nbsp;&nbsp;&nbsp; Cabling Specifications/Limitations<br> &nbsp;&nbsp;&nbsp; Cabling Considerations<br> &nbsp;&nbsp;&nbsp; Cabling Issues<br> &nbsp;&nbsp;&nbsp; Signal Degradation<br> &nbsp;&nbsp;&nbsp; Interference<br> &nbsp;&nbsp;&nbsp; Improper Termination<br> &nbsp;&nbsp;&nbsp; Incorrect Pinout<br> &nbsp;&nbsp;&nbsp; Bad Ports<br> &nbsp;&nbsp;&nbsp; Open/Short<br> &nbsp;&nbsp;&nbsp; LED Status Indicators<br> &nbsp;&nbsp;&nbsp; Duplexing Issues<br> &nbsp;&nbsp;&nbsp; TX/RX Reversed<br> &nbsp;&nbsp;&nbsp; Dirty Optical Cables<br> &nbsp;&nbsp;&nbsp; Interface Issues<br> Hardware Issues<br> &nbsp;&nbsp;&nbsp; Power over Ethernet Issues<br> &nbsp;&nbsp;&nbsp; Transceiver Issues<br> Common Tools<br> &nbsp;&nbsp;&nbsp; Cable Crimpers, Strippers, and Snips/Cutters<br> &nbsp;&nbsp;&nbsp; Punchdown Tools<br> &nbsp;&nbsp;&nbsp; Tone Generator<br> &nbsp;&nbsp;&nbsp; Loopback Adapter<br> &nbsp;&nbsp;&nbsp; TDR/OTDR<br> &nbsp;&nbsp;&nbsp; Multimeter<br> &nbsp;&nbsp;&nbsp; Cable Tester<br> &nbsp;&nbsp;&nbsp; Wire Map<br> &nbsp;&nbsp;&nbsp; Tap<br> &nbsp;&nbsp;&nbsp; Fusion Splicer<br> &nbsp;&nbsp;&nbsp; Spectrum Analyzer<br> &nbsp;&nbsp;&nbsp; Fiber Light Meter<br> What’s Next?<br><strong>CHAPTER 6</strong> Wireless Solutions<br> Understanding Wireless Basics<br> &nbsp;&nbsp;&nbsp; Wireless Channels and Frequencies<br> &nbsp;&nbsp;&nbsp; Speed, Distance, and Bandwidth<br> &nbsp;&nbsp;&nbsp; Channel Bonding<br> &nbsp;&nbsp;&nbsp; MIMO/MU-MIMO/Directional/Omnidirectional<br> &nbsp;&nbsp;&nbsp; Network Types<br> &nbsp;&nbsp;&nbsp; Establishing Communications Between Wireless Devices<br> &nbsp;&nbsp;&nbsp; Guest Networks<br> &nbsp;&nbsp;&nbsp; Configuring the Wireless Connection<br> &nbsp;&nbsp;&nbsp; Autonomous and Lightweight Access Points<br> What’s Next?<br><strong>CHAPTER 7</strong> Cloud Computing Concepts and Options<br> Cloud Concepts<br> &nbsp;&nbsp;&nbsp; Service Models<br> &nbsp;&nbsp;&nbsp; Software as a Service<br> &nbsp;&nbsp;&nbsp; Platform as a Service<br> &nbsp;&nbsp;&nbsp; Infrastructure as a Service<br> &nbsp;&nbsp;&nbsp; Deployment Models<br> &nbsp;&nbsp;&nbsp; Private Cloud<br> &nbsp;&nbsp;&nbsp; Public Cloud<br> &nbsp;&nbsp;&nbsp; Hybrid Cloud<br> &nbsp;&nbsp;&nbsp; Multitenancy<br> &nbsp;&nbsp;&nbsp; Elasticity<br> &nbsp;&nbsp;&nbsp; Scalability<br> &nbsp;&nbsp;&nbsp; Network Functions Virtualization (NFV)<br> &nbsp;&nbsp;&nbsp; Cloud Connectivity Options<br> &nbsp;&nbsp;&nbsp; Virtual Private Cloud (VPC)<br> &nbsp;&nbsp;&nbsp; Cloud Gateways<br> &nbsp;&nbsp;&nbsp; Network Security, Groups, and Lists<br> What’s Next?<br><strong>CHAPTER 8</strong> Network Operations<br> Physical Installation Factors<br> &nbsp;&nbsp;&nbsp; Components of Wiring Distribution<br> &nbsp;&nbsp;&nbsp; Using Uninterruptible Power Supplies<br> &nbsp;&nbsp;&nbsp; Beyond the UPS<br> &nbsp;&nbsp;&nbsp; Environmental Factors<br> Organizational Processes and Procedures<br> &nbsp;&nbsp;&nbsp; Wiring and Port Locations<br> &nbsp;&nbsp;&nbsp; Physical and Logical Network Diagrams<br> &nbsp;&nbsp;&nbsp; Baseline/Golden Configurations<br> &nbsp;&nbsp;&nbsp; Policies, Procedures, Configurations, and Regulations<br> &nbsp;&nbsp;&nbsp; Labeling<br> Monitoring Network Performance<br> &nbsp;&nbsp;&nbsp; Common Performance Metrics<br> &nbsp;&nbsp;&nbsp; SNMP<br> &nbsp;&nbsp;&nbsp; Network Performance, Load, and Stress Testing<br> &nbsp;&nbsp;&nbsp; Network Device Logs<br> Disaster Recovery and High Availability<br> &nbsp;&nbsp;&nbsp; Backups<br> &nbsp;&nbsp;&nbsp; Backup Best Practices<br> &nbsp;&nbsp;&nbsp; Cold, Warm, Hot, and Cloud Sites<br> &nbsp;&nbsp;&nbsp; High-Availability Approaches and Recovery Concepts<br> &nbsp;&nbsp;&nbsp; Active-Active Versus Active-Passive<br> &nbsp;&nbsp;&nbsp; DR Testing<br> Network Access and Management Methods<br> &nbsp;&nbsp;&nbsp; Site-to-Site VPN<br> &nbsp;&nbsp;&nbsp; Client-to-Site VPN<br> &nbsp;&nbsp;&nbsp; Connection Methods<br> &nbsp;&nbsp;&nbsp; Jump Box<br> &nbsp;&nbsp;&nbsp; In-Band Versus Out-of-Band Management<br> What’s Next?<br><strong>CHAPTER 9</strong> Network Security<br> Common Security Concepts<br> &nbsp;&nbsp;&nbsp; Encryption<br> &nbsp;&nbsp;&nbsp; Access Control<br> &nbsp;&nbsp;&nbsp; Mandatory Access Control<br> &nbsp;&nbsp;&nbsp; Discretionary Access Control<br> &nbsp;&nbsp;&nbsp; Rule-Based Access Control<br> &nbsp;&nbsp;&nbsp; Role-Based Access Control<br> &nbsp;&nbsp;&nbsp; Defense in Depth<br> &nbsp;&nbsp;&nbsp; Separation of Duties<br> &nbsp;&nbsp;&nbsp; Deception Technologies: Honeypots and Honeynets<br> &nbsp;&nbsp;&nbsp; RADIUS and TACACS+<br> &nbsp;&nbsp;&nbsp; Kerberos Authentication<br> &nbsp;&nbsp;&nbsp; Local Authentication<br> &nbsp;&nbsp;&nbsp; Lightweight Directory Access Protocol<br> &nbsp;&nbsp;&nbsp; Using Certificates<br> &nbsp;&nbsp;&nbsp; Identity and Access Management (IAM)<br> &nbsp;&nbsp;&nbsp; Security Assertion Markup Language (SAML)<br> &nbsp;&nbsp;&nbsp; Multifactor Authentication Factors<br> &nbsp;&nbsp;&nbsp; Auditing and Regulatory Compliance<br> &nbsp;&nbsp;&nbsp; Additional Access Control Methods<br> &nbsp;&nbsp;&nbsp; Risk Management<br> &nbsp;&nbsp;&nbsp; Penetration Testing<br> &nbsp;&nbsp;&nbsp; Security Information and Event Management<br> Common Networking Attacks<br> &nbsp;&nbsp;&nbsp; Denial-of-Service and Distributed Denial-of-Service Attacks<br> &nbsp;&nbsp;&nbsp; Other Common Attacks<br> &nbsp;&nbsp;&nbsp; Vulnerabilities and Prevention<br> Applying Network Security<br> &nbsp;&nbsp;&nbsp; Disposing of Assets<br> &nbsp;&nbsp;&nbsp; Secured Versus Unsecured Protocols<br> &nbsp;&nbsp;&nbsp; Key Management<br> &nbsp;&nbsp;&nbsp; Hardening Best Practices<br> &nbsp;&nbsp;&nbsp; Wireless Security<br> &nbsp;&nbsp;&nbsp; Working with Zones<br> What’s Next?<br><strong>CHAPTER 10</strong> Network Troubleshooting<br> Troubleshooting Steps and Procedures<br> &nbsp;&nbsp;&nbsp; Identify the Problem<br> &nbsp;&nbsp;&nbsp; Establish a Theory of Probable Cause<br> &nbsp;&nbsp;&nbsp; Test the Theory to Determine the Cause<br> &nbsp;&nbsp;&nbsp; Establish a Plan of Action<br> &nbsp;&nbsp;&nbsp; Implement the Solution or Escalate<br> &nbsp;&nbsp;&nbsp; Verify Full System Functionality<br> &nbsp;&nbsp;&nbsp; Document Findings, Actions, Outcomes, and Lessons Learned Throughout the Process<br> Troubleshooting Common Networking Issues<br> &nbsp;&nbsp;&nbsp; Common Considerations<br> &nbsp;&nbsp;&nbsp; Common Problems to Be Aware Of<br> &nbsp;&nbsp;&nbsp; Hardware Failure<br> &nbsp;&nbsp;&nbsp; Network Performance Issues<br> &nbsp;&nbsp;&nbsp; Wireless Issues<br> &nbsp;&nbsp;&nbsp; Site Surveys<br> &nbsp;&nbsp;&nbsp; Factors Affecting Wireless Signals<br> &nbsp;&nbsp;&nbsp; Troubleshooting AP Coverage<br> Troubleshooting Tools<br> &nbsp;&nbsp;&nbsp; Toner<br> &nbsp;&nbsp;&nbsp; Cable Tester<br> &nbsp;&nbsp;&nbsp; Taps<br> &nbsp;&nbsp;&nbsp; Visual Fault Locator<br> &nbsp;&nbsp;&nbsp; Wi-Fi Analyzer<br> &nbsp;&nbsp;&nbsp; Protocol Analyzer<br> &nbsp;&nbsp;&nbsp; Speed Tester<br> &nbsp;&nbsp;&nbsp; Port Scanner<br> &nbsp;&nbsp;&nbsp; LLDP and CDP<br> &nbsp;&nbsp;&nbsp; NetFlow Analyzer<br> &nbsp;&nbsp;&nbsp; TFTP Server<br> &nbsp;&nbsp;&nbsp; Terminal Emulator<br> &nbsp;&nbsp;&nbsp; IP Scanner<br> &nbsp;&nbsp;&nbsp; Command-Line Tools<br> &nbsp;&nbsp;&nbsp; The Trace Route Utility (tracert/traceroute)<br> &nbsp;&nbsp;&nbsp; ping<br> &nbsp;&nbsp;&nbsp; ARP<br> &nbsp;&nbsp;&nbsp; The netstat Command<br> &nbsp;&nbsp;&nbsp; ipconfig<br> &nbsp;&nbsp;&nbsp; ifconfig<br> &nbsp;&nbsp;&nbsp; nslookup<br> &nbsp;&nbsp;&nbsp; dig<br> &nbsp;&nbsp;&nbsp; The tcpdump Command<br> &nbsp;&nbsp;&nbsp; The route Utility<br> &nbsp;&nbsp;&nbsp; nmap<br> &nbsp;&nbsp;&nbsp; Basic Networking Device Commands<br> What’s Next?<br><strong>Cram Sheet<br><br> Online<br></strong>Glossary<br><br> 9780135340837&nbsp;&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 7/25/2024<br></p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CompTIA Network+ N10-009 Exam Cram